Malware

Understanding Social Engineering

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 19:55

The title of the new book is Understanding Social Engineering Based Schemes. And its mission is three-fold, Jakobsson says. He wants to profile today's most common schemes, forecast some future trends, and help organizations build effective countermeasures.

In an interview about the contents of his new book, Jakobsson discusses:

  • The evolution of socially engineered schemes;
  • Why these scams are still so successful;
  • Technology solutions that can help detect and deter the scammers.

Proactive Malware Hunting

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 16:54

If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.

In an interview about proactive malware detection, Kleczynski discusses:

  • Why it's not enough to react to malware;
  • The evolution of endpoint malware detection;
  • Why risks of the Internet of Things are overhyped.